Sciweavers

2486 search results - page 389 / 498
» Database and the Web
Sort
View
67
Voted
ICDE
2010
IEEE
208views Database» more  ICDE 2010»
16 years 16 days ago
Intensional Associations in Dataspaces
Dataspace applications necessitate the creation of associations among data items over time. For example, once information about people is extracted from sources on the Web, associa...
Marcos Antonio Vaz Salles, Jens Dittrich, Lukas Bl...
91
Voted
ICDE
2010
IEEE
331views Database» more  ICDE 2010»
15 years 7 months ago
Navigation system for product search
Abstract— We demonstrate Product EntityCube, a product recommendation and navigation system. While the unprecedented scale of a product search portal enables to satisfy users wit...
Jongwuk Lee, Seung-won Hwang, Zaiqing Nie, Ji-Rong...
92
Voted
EDBT
2010
ACM
200views Database» more  EDBT 2010»
15 years 7 months ago
Rewrite techniques for performance optimization of schema matching processes
A recurring manual task in data integration, ontology alignment or model management is finding mappings between complex meta data structures. In order to reduce the manual effor...
Eric Peukert, Henrike Berthold, Erhard Rahm
EDBT
2009
ACM
123views Database» more  EDBT 2009»
15 years 7 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...
84
Voted
ICSE
2009
IEEE-ACM
15 years 7 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...